BitTorrent Sync 1.0.116

At the moment BitTorrent Sync works on Windows, Mac and Linux devices that meet the following system requirements:

Mac OS X Snow Leopard or later

Windows XP SP3 (32-bit) or newer (32 and 64-bit)

Linux with kernel 2.6.16 (glibc 2.4) or newer on ARM/PPC/i386/x86_64

You can install our application on Network Attached Storages (NAS) running on Linux with ARM, PowerPC, i386 and x86_64 architecture. In the future, we plan to also support most popular mobile platforms. P2P Protocol BitTorrent Sync synchronizes your files using a peer-to-peer (P2P) protocol. This protocol is very effective for transferring large files across multiple devices, and is very similar to the powerful protocol used by applications like µTorrent and BitTorrent. The data is transferred in pieces from each of the syncing devices, and BitTorrent Sync chooses the optimal algorithm to make sure you have a maximum download and upload speed during the process. The devices you setup to sync are connected directly using UDP, NAT traversal and UPnP port mapping. We also provide such additional methods of ensuring connectivity as relay and tracker servers. If your devices are on the same local network, BitTorrent Sync will use your LAN for faster synchronization. Security BitTorrent Sync was designed with privacy and security in mind. All the traffic between devices is encrypted with AES cypher and a 256-bit key created on the base of the secret—a random string (20 bytes or more) that is unique for every folder. It’s our priority to make sure that nobody has unauthorized access to your folders. That’s why there are no 3rd party servers involved when syncing your files. All the files are stored only on your trusted devices, controlled and managed solely by you. For the same reason we provide you with a quick and easy way to manage secrets. You can regularly change them and invite people by sharing a one-time secret instead of distributing a permanent one. Secret The secret is a randomly generated 21-byte key. It is Base32-encoded in order to be readable by humans. BitTorrent Sync uses dev/random (Mac, Linux) and the Crypto API (Windows) in order to produce a completely random string. This authentication approach is significantly stronger than a login/password combination used by other services. That`s why using a secret generated by BitTorrent Sync is very safe and secure. If you want even more security, BitTorrent Sync gives you a way to use a custom secret. Just create your own secret, encode it with Base64, and enter in the secret field for BitTorrent Sync. Note that a custom secret should be more than 40 characters long. Peer Discovery In order to find proper peers that have the same secret, Sync uses:

Local peer discovery. All peers inside local network are discovered by sending broadcast packets. If there are peers with the same secret they respond to the broadcast message and connect.

Peer exchange (PEX). When two peers are connected, they exchange information about other peers they know.

Known hosts (folder settings). If you have a known host with a static ip:port, you can specify this in Sync client, so that it connects to the peer using this information.

DHT. Sync uses DHT to distribute information about itself and obtain the information about other peers with this secret. Sync sends SHA2(Secret):ip:port to DHT to announce itself and will get a list of peers by asking DHT for the following key SHA2(Secret)

BitTorrent tracker. BitTorrent Sync can use a specific tracker server to facilitate peer discovery. The tracker server sees the combination of SHA2(secret):ip:port and helps peers connect directly. The BitTorrent Sync tracker also acts like a STUN server and can help do a NAT traversal for peers so that they can establish a direct connection even behind a NAT.

We recommend that you use a tracker server instead of DHT for reasons of faster response and NAT traversal, so peers have a higher probability of networking directly. Traffic Relay There are rare cases when peers can’t talk directly. This usually happens when devices are in an office behind strong firewalls. In such a case BitTorrent provides a relay server to route traffic between peers. All traffic is AES encrypted with your secret, so there is no chance for us to see any of your data. You can opt out of this, but it could result in peers not being able to network with each other.

BTSync.exe file was thoroughly tested by our system on May 24, 2014 by the three antivirus programs and passed. Is absolutely clean, enjoy!
This archive is 100% safe to download and install.
Have a look at the full BitTorrent Sync 1.0.116 antivirus scan reports.

Download alternate to BitTorrent Sync solution

Look at the free or trial alternatives and similar apps to BitTorrent Sync software by the tags. It's possible also to find substitutes for the most popular titles in the Operating System Utils category.

Useful independent reviews and opinions of the users

Write a review« Be the first to post a review for BitTorrent Sync download!

Predicted future versions and notices:

The doDownload.com constantly monitors the update of all programs, including information from the BitTorrent Sync 1.0.117 changelog file, however sometimes it can happen that data are not complete or are outdated.We assume that author continue's to develop 1.1.0 version with further advanced features, and soon you will be informed. Equally important 2.0.0 upgrades of the program we will continue to monitor. Full BitTorrent Sync description has been compared with the overall software database and our algorithm has found the following applications (are showed below).

...Easy Computer Sync lets you quickly and easily synchronize data between two computers using a USB 2...The program also includes instructions on how to get an Easy Transfer Cable...You can quickly synchronize your data folders...

...The main purpose of the program is synchronizing PC clock using HTTP protocol instead NTP or SNTP protocols...Some users and system administrators need such product because they have problems with standard...The program can be used on the along computer connected to the Internet and in a local network...

...All Entourage fields sync to Address Book and back...You can keep both applications in constant synchronization by running the script at any time...now allows full transfer of all contacts and syncing for 14 days...

...Looking to remove or shred files permanently from your computer system...then without any second opinion file shredder is the most appropriate application that you can rely on...the key aspect that makes it quite appropriate for secure file deletion is its ability of rewriting the file with random series of binary data multiple times...